Hello cyberman!This article subject LDAP and hacking with LDAP. First of all, we need to know what LDAP is. The definition LDAP in Wikipeadia: The LDAP (The Lightweight Directory Access Protocol) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services […]

Read More

Hello Cyberman! This article subject Javascript and its blockeds. Firstly, we need know what is Javascript. What Is The JavaScript? Javascript is a programming language. This technology working in web browsers based. But today, it appeals to many different areas. For example: Desktop App Mobile App Game WEB App or design However, our topic will […]

Read More

Hello Cyberman! This article subject how to a human find in internet… Maybe he/she is your valentine maybe other.  Yes, Social Network But  With True Method If the person’s name, surname, place of residence and contact information, such as phone number, e-mail address, etc. if. Look at the best popular social media sites, all of […]

Read More

  Hello Cyberman, This article subject XML/XPath Injection vulnerability on web app.  What Is The XPath Vulnerability? First, we need learning to XML. It is possible to summarize with a quote from Wikipedia below. XML; Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data.  Yes, as […]

Read More

Hello Cyberman! Again a Facebook problem and a again victim list… Recently, absurd pictures have increased again in Facebook groups. What would you say like: Above picture like… I know, it looks gross. If you click picture, you are going to instagram.com. I know, you only clicked because you were curious or because you like […]

Read More

Hello Cyberman! This article subject os command injection on web app. With this vulnerability, the attacker can run any operating system command in areas allowed by the system. The operating system does not matter. For example: If there is this vulnerability, when the attacker enters a command (like whoami) on the system, he/she will see […]

Read More